Jump to content
Not connected, Your IP: 3.17.183.56
Sign in to follow this  
sunnymorning

recently getting connection dropouts aka softresets every hour !

Recommended Posts

01/21/2013 - 7:59 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 7:59 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 7:59 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 7:59 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 7:59 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 7:59 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 7:59 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 7:59 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 7:59 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 7:59 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 7:59 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 7:59 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 7:59 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down

01/21/2013 - 8:00 AM Route: Waiting for TUN/TAP interface to come up...

01/21/2013 - 8:00 AM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

01/21/2013 - 8:00 AM C:\Windows\system32\route.exe ADD 94.185.85.170 MASK 255.255.255.255 195.142.43.69

01/21/2013 - 8:00 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

01/21/2013 - 8:00 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:00 AM C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.6.37

01/21/2013 - 8:00 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 8:00 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:00 AM C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.6.37

01/21/2013 - 8:00 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 8:00 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:00 AM C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.6.37

01/21/2013 - 8:00 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 8:00 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:00 AM Initialization Sequence Completed

01/21/2013 - 8:00 AM Starting Management Interface...

01/21/2013 - 8:00 AM Checking...

01/21/2013 - 8:00 AM Retrieve statistics...

01/21/2013 - 8:00 AM Connected.

01/21/2013 - 8:01 AM Disconnecting...

01/21/2013 - 8:01 AM SIGTERM received, sending exit notification to peer

01/21/2013 - 8:01 AM C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.6.37

01/21/2013 - 8:01 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 8:01 AM C:\Windows\system32\route.exe DELETE 94.185.85.170 MASK 255.255.255.255 195.142.43.69

01/21/2013 - 8:01 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 8:01 AM C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.6.37

01/21/2013 - 8:01 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 8:01 AM C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.6.37

01/21/2013 - 8:01 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 8:01 AM Closing TUN/TAP interface

01/21/2013 - 8:01 AM SIGTERM[hard,] received, process exiting

01/21/2013 - 8:01 AM Disconnected.

01/21/2013 - 8:01 AM Login...

01/21/2013 - 8:01 AM Unable to connect to the remote server

01/21/2013 - 8:01 AM Login...

01/21/2013 - 8:01 AM Unable to connect to the remote server

01/21/2013 - 8:02 AM Login...

01/21/2013 - 8:02 AM Login success.

01/21/2013 - 8:02 AM Contacting service...

01/21/2013 - 8:02 AM Connecting...

01/21/2013 - 8:02 AM OpenVPN 2.3.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Jan 8 2013

01/21/2013 - 8:02 AM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

01/21/2013 - 8:02 AM Socket Buffers: R=[8192->8192] S=[8192->8192]

01/21/2013 - 8:02 AM UDPv4 link local: [undef]

01/21/2013 - 8:02 AM UDPv4 link remote: [AF_INET]178.248.30.131:443

01/21/2013 - 8:02 AM TLS: Initial packet from [AF_INET]178.248.30.131:443, sid=dc5c18ae 88d1849d

01/21/2013 - 8:02 AM VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

01/21/2013 - 8:02 AM VERIFY OK: nsCertType=SERVER

01/21/2013 - 8:02 AM VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

01/21/2013 - 8:02 AM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 8:02 AM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 8:02 AM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 8:02 AM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 8:02 AM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

01/21/2013 - 8:02 AM [server] Peer Connection Initiated with [AF_INET]178.248.30.131:443

01/21/2013 - 8:02 AM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

01/21/2013 - 8:02 AM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.3.150 10.4.3.149'

01/21/2013 - 8:02 AM OPTIONS IMPORT: timers and/or timeouts modified

01/21/2013 - 8:02 AM OPTIONS IMPORT: LZO parms modified

01/21/2013 - 8:02 AM OPTIONS IMPORT: --ifconfig/up options modified

01/21/2013 - 8:02 AM OPTIONS IMPORT: route options modified

01/21/2013 - 8:02 AM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

01/21/2013 - 8:02 AM do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

01/21/2013 - 8:02 AM open_tun, tt->ipv6=0

01/21/2013 - 8:02 AM TAP-WIN32 device [AirVpn or Mullvad] opened: \\.\Global\{FA782FAD-72D8-4DC0-A2F3-6500F671DD0D}.tap

01/21/2013 - 8:02 AM TAP-Windows Driver Version 9.9

01/21/2013 - 8:02 AM Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.150/255.255.255.252 on interface {FA782FAD-72D8-4DC0-A2F3-6500F671DD0D} [DHCP-serv: 10.4.3.149, lease-time: 31536000]

01/21/2013 - 8:02 AM Successful ARP Flush on interface [17] {FA782FAD-72D8-4DC0-A2F3-6500F671DD0D}

01/21/2013 - 8:02 AM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

01/21/2013 - 8:02 AM C:\Windows\system32\route.exe ADD 178.248.30.131 MASK 255.255.255.255 195.142.43.69

01/21/2013 - 8:02 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

01/21/2013 - 8:02 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:02 AM C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.149

01/21/2013 - 8:02 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 8:02 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:02 AM C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.149

01/21/2013 - 8:02 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 8:02 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:02 AM C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.149

01/21/2013 - 8:02 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 8:02 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 8:02 AM Initialization Sequence Completed

01/21/2013 - 8:02 AM Starting Management Interface...

01/21/2013 - 8:02 AM Checking...

01/21/2013 - 8:03 AM Retrieve statistics...

01/21/2013 - 8:03 AM Connected.

01/21/2013 - 9:02 AM TLS: soft reset sec=0 bytes=319280059/0 pkts=344460/0

01/21/2013 - 9:02 AM VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

01/21/2013 - 9:02 AM VERIFY OK: nsCertType=SERVER

01/21/2013 - 9:02 AM VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

01/21/2013 - 9:02 AM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 9:02 AM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 9:02 AM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 9:02 AM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 9:02 AM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

01/21/2013 - 9:48 AM [server] Inactivity timeout (--ping-restart), restarting

01/21/2013 - 9:48 AM C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.3.149

01/21/2013 - 9:48 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 9:48 AM C:\Windows\system32\route.exe DELETE 178.248.30.131 MASK 255.255.255.255 195.142.43.69

01/21/2013 - 9:48 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 9:48 AM C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.3.149

01/21/2013 - 9:48 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 9:48 AM C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.3.149

01/21/2013 - 9:48 AM Route deletion via IPAPI succeeded [adaptive]

01/21/2013 - 9:48 AM Closing TUN/TAP interface

01/21/2013 - 9:48 AM SIGUSR1[soft,ping-restart] received, process restarting

01/21/2013 - 9:48 AM Restart pause, 2 second(s)

01/21/2013 - 9:48 AM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

01/21/2013 - 9:48 AM Socket Buffers: R=[8192->8192] S=[8192->8192]

01/21/2013 - 9:48 AM UDPv4 link local: [undef]

01/21/2013 - 9:48 AM UDPv4 link remote: [AF_INET]178.248.30.131:443

01/21/2013 - 9:48 AM TLS: Initial packet from [AF_INET]178.248.30.131:443, sid=5b382041 62372b5f

01/21/2013 - 9:48 AM VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

01/21/2013 - 9:48 AM VERIFY OK: nsCertType=SERVER

01/21/2013 - 9:48 AM VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

01/21/2013 - 9:49 AM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 9:49 AM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 9:49 AM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 9:49 AM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 9:49 AM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

01/21/2013 - 9:49 AM [server] Peer Connection Initiated with [AF_INET]178.248.30.131:443

01/21/2013 - 9:49 AM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

01/21/2013 - 9:49 AM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.3.150 10.4.3.149'

01/21/2013 - 9:49 AM OPTIONS IMPORT: timers and/or timeouts modified

01/21/2013 - 9:49 AM OPTIONS IMPORT: LZO parms modified

01/21/2013 - 9:49 AM OPTIONS IMPORT: --ifconfig/up options modified

01/21/2013 - 9:49 AM OPTIONS IMPORT: route options modified

01/21/2013 - 9:49 AM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

01/21/2013 - 9:49 AM do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

01/21/2013 - 9:49 AM open_tun, tt->ipv6=0

01/21/2013 - 9:49 AM TAP-WIN32 device [AirVpn or Mullvad] opened: \\.\Global\{FA782FAD-72D8-4DC0-A2F3-6500F671DD0D}.tap

01/21/2013 - 9:49 AM TAP-Windows Driver Version 9.9

01/21/2013 - 9:49 AM Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.150/255.255.255.252 on interface {FA782FAD-72D8-4DC0-A2F3-6500F671DD0D} [DHCP-serv: 10.4.3.149, lease-time: 31536000]

01/21/2013 - 9:49 AM Successful ARP Flush on interface [17] {FA782FAD-72D8-4DC0-A2F3-6500F671DD0D}

01/21/2013 - 9:49 AM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

01/21/2013 - 9:49 AM C:\Windows\system32\route.exe ADD 178.248.30.131 MASK 255.255.255.255 195.142.43.69

01/21/2013 - 9:49 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

01/21/2013 - 9:49 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 9:49 AM C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.149

01/21/2013 - 9:49 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 9:49 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 9:49 AM C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.149

01/21/2013 - 9:49 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 9:49 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 9:49 AM C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.149

01/21/2013 - 9:49 AM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

01/21/2013 - 9:49 AM Route addition via IPAPI succeeded [adaptive]

01/21/2013 - 9:49 AM Initialization Sequence Completed

01/21/2013 - 9:49 AM Starting Management Interface...

01/21/2013 - 9:49 AM Checking...

01/21/2013 - 9:49 AM Retrieve statistics...

01/21/2013 - 9:49 AM Connected.

01/21/2013 - 10:49 AM TLS: soft reset sec=0 bytes=43043030/0 pkts=58037/0

01/21/2013 - 10:49 AM VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

01/21/2013 - 10:49 AM VERIFY OK: nsCertType=SERVER

01/21/2013 - 10:49 AM VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

01/21/2013 - 10:49 AM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 10:49 AM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 10:49 AM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

01/21/2013 - 10:49 AM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

01/21/2013 - 10:49 AM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

what is going on this has been going like this for the last couple of days

Share this post


Link to post

Hello!

Every hour the TLS key is renegotiated for additional security. During SSL/TLS rekeying, there is a transition-window parameter that permits overlap between old and new key usage, so there is no time pressure or latency bottleneck during SSL/TLS renegotiations (and the tunnel is never broken).

http://openvpn.net/index.php/open-source/documentation/security-overview.html

That said, your logs show two problems: in one case, the TUN/TAP interface did not come up properly. If this problem persists (but in the remaining part of the logs the problem does not occur anymore), it is recommended that you uninstall OpenVPN and you install the new OpenVPN 2.3.0 (see https://airvpn.org/windows to update the Air client as well). Upgrade to new client 1.8 and OpenVPN 2.3.0 is highly recommended if you run Windows 8.

The second problem is showed in the following log line:

01/21/2013 - 9:48 AM [server] Inactivity timeout (--ping-restart), restarting

which suggests a momentary connection drop from your ISP or (unlikely, unless you live in a human rights hostile country) an active disruption of OpenVPN connection.

Kind regards

Share this post


Link to post

im already using your latest 1.8 airvpn client before i removed the old 1.7 , as you can see from the connection logs as it shows the new openvpn version

OpenVPN 2.3.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Jan 8 2013

thanks for clearing that up btw, ill let you know if i notice any connection dropouts and post the airvpn log then again , just making sure everythings ok , nice to see your working on the client software

Share this post


Link to post

im already using your latest 1.8 airvpn client before i removed the old 1.7 , as you can see from the connection logs as it shows the new openvpn version

OpenVPN 2.3.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Jan 8 2013

thanks for clearing that up btw, ill let you know if i notice any connection dropouts and post the airvpn log then again , just making sure everythings ok , nice to see your working on the client software

Hello!

Very well. Don't forget that a TLS soft reset is not a connection dropout and does not slow down your connection in any way, on the contrary it's a good security feature (you can disable it or change the soft reset time period, but we strongly recommend you keep it enabled and not higher than 60 minutes).

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...